Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Abstract—In this work we explore the feasibility of implementing infrastructure-to-vehicle (I2V) communication through the UMTS infrastructure. We identify the problems that aris...
There is a movement in healthcare towards preventative care. This shift involves using technology to assist in care provision outside traditional care institutions -- for instance,...
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
The complexity and dynamic nature of travelling offers many opportunities for technological support. But printed guidebooks remain the typical companion, despite many weaknesses. ...